CVE-2026-25723

Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.55.
Configurations

Configuration 1 (hide)

cpe:2.3:a:anthropic:claude_code:*:*:*:*:*:node.js:*:*

History

09 Feb 2026, 14:50

Type Values Removed Values Added
References () https://github.com/anthropics/claude-code/security/advisories/GHSA-mhg7-666j-cqg4 - () https://github.com/anthropics/claude-code/security/advisories/GHSA-mhg7-666j-cqg4 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Anthropic
Anthropic claude Code
CPE cpe:2.3:a:anthropic:claude_code:*:*:*:*:*:node.js:*:*

06 Feb 2026, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 18:15

Updated : 2026-02-09 14:50


NVD link : CVE-2026-25723

Mitre link : CVE-2026-25723

CVE.ORG link : CVE-2026-25723


JSON object : View

Products Affected

anthropic

  • claude_code
CWE
CWE-20

Improper Input Validation

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')